Understanding the Security Model

Our security model makes it very easy for you to manage the user account details, role assignment, and tenant access for your users.

Reltio's Security model uses Permissions to grant access to user accounts. Permissions are a combination of Services, Resources/Sub-resources, and Privileges. You can use roles to provide these permissions to the users, making sure you have total control over each user's accessibility to features and functionality in the Reltio platform.

Permissions include three key elements: Reltio Platform Services, Resources/Sub-resources, and Privileges. For example, to enable user A to monitor the health of an LCA service, you would need to provide the READ privilege for the Monitoring Resource in the LCA Service.

To understand the common terms we use in our security model, see the Terminology topic.